The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
In this paper, we have examined the effectiveness exchange of optical vorticity via three-wave mixing (TWM) technique in a four-level quantum dot (QD) molecule by means of the electron tunneling effect. Our analytical analysis demonstrates that the TWM procedure can result in the production of a new weak signal beam that may be absorbed or amplified within the QD molecule. We have taken into account the electron tunneling as well as the relative phase of the applied lights to assess the absorption and dispersion characteristics of the newly generated light. We have discovered that the slow light propagation and signal amplification can be achieved. Our results show that the exchange o
In our research, we seek to shed a light on one of the most important and sensitive issues, namely, the Sufi influence in the Iraqi novel through the lame maqam of the novelist Jumaa Al-Lami, the Sufi discourse contains many semantic paradoxes between the text's apparent pronunciation and its interpretation of the format and the context that produced these patterns, and incited them, which concludes different results from the prevailing provisions and fixed ideas from the narrative text.The Arabic and Iraqi novel in particular became inspired by the power of Sufi discourse by talking about several Sufi figures by referring to it openly, or implicitly inspired by unauthorized concealment, in employing some of the ideas, or summoning
... Show MoreThe study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show Moreبسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreA laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th
... Show More
